};
QueryResolver::QueryResolver(const DOMElement* e)
- : m_log(Category::getInstance(SHIBSP_LOGCAT".AttributeResolver.Query")),
+ : m_log(Category::getInstance(SHIBSP_LOGCAT ".AttributeResolver.Query")),
m_policyId(XMLHelper::getAttrString(e, nullptr, policyId)),
m_subjectMatch(XMLHelper::getAttrBool(e, false, subjectMatch))
{
// With this flag on, we block unauthenticated ciphertext when decrypting,
// unless the protocol was authenticated.
- pair<bool,bool> authenticatedCipher = application.getBool("requireAuthenticatedCipher");
+ pair<bool,bool> authenticatedCipher = application.getBool("requireAuthenticatedEncryption");
if (policy->isAuthenticated())
authenticatedCipher.second = false;
tokenwrapper.release();
newtokenwrapper.reset(newtoken);
if (m_log.isDebugEnabled())
- m_log.debugStream() << "decrypted Assertion: " << *newtoken << logging::eol;
+ m_log.debugStream() << "decrypted assertion: " << *newtoken << logging::eol;
}
}
catch (exception& ex) {
- m_log.error(ex.what());
+ m_log.error("failed to decrypt assertion: %s", ex.what());
throw;
}
}